Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2023 10:39

General

  • Target

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe

  • Size

    1.5MB

  • MD5

    6367fb0d52b90b807550b3eedbb277f0

  • SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

  • SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

  • SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • SSDEEP

    24576:Aj3JaPnj1wF03rp/EKWVgdG2rhQpG458wNNqZ:Aj3JE1wclEKMgdGpGydNy

Malware Config

Signatures

  • Detect PureLogs payload 6 IoCs
  • Detect ZGRat V1 28 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
    "C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
      C:\Users\Admin\AppData\Local\Temp\588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {C99C48EC-EC73-4D0A-BEF1-A8C94552B50B} S-1-5-21-2085049433-1067986815-1244098655-1000:AHLBRYJO\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe
      C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe
        C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe
        3⤵
        • Executes dropped EXE
        PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • C:\Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • \Users\Admin\AppData\Local\IsFamilyOrAssembly\jfnzwamsj\MajorRevision.exe

    Filesize

    1.5MB

    MD5

    6367fb0d52b90b807550b3eedbb277f0

    SHA1

    426f118550fa5006fbcab8c6d78b105600bf82c3

    SHA256

    588506d91ec77a608a62417ea1d67204b1b173bd90af7e17cf52bbd0f03f7d2d

    SHA512

    185171a50f2ce8d0742dc2e1fee5b2b91fd6884f899726495823124eed8b83094a9d570b04f7a9fbcaac56eca7e48a1c1679a3f284ea0ac3707340df1584b671

  • memory/1012-2229-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1012-2230-0x00000000002D0000-0x000000000044A000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-2244-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2020-2246-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2020-2245-0x000007FEF5100000-0x000007FEF5AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-0-0x0000000001200000-0x000000000137A000-memory.dmp

    Filesize

    1.5MB

  • memory/2412-6-0x00000000002F0000-0x000000000033C000-memory.dmp

    Filesize

    304KB

  • memory/2412-19-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB

  • memory/2412-5-0x000000001B6A0000-0x000000001B768000-memory.dmp

    Filesize

    800KB

  • memory/2412-4-0x000000001B030000-0x000000001B0F8000-memory.dmp

    Filesize

    800KB

  • memory/2412-3-0x000000001B1C0000-0x000000001B240000-memory.dmp

    Filesize

    512KB

  • memory/2412-2-0x0000000000CE0000-0x0000000000DC0000-memory.dmp

    Filesize

    896KB

  • memory/2412-1-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB

  • memory/2592-37-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-53-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-21-0x000000001AF00000-0x000000001AFE4000-memory.dmp

    Filesize

    912KB

  • memory/2592-22-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-23-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-25-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-27-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-29-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-31-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-33-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-35-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-18-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB

  • memory/2592-39-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-41-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-43-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-45-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-47-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-49-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-51-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-20-0x000000001B0E0000-0x000000001B160000-memory.dmp

    Filesize

    512KB

  • memory/2592-55-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-57-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-59-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-61-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-63-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-65-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-67-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-69-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-71-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-73-0x000000001AF00000-0x000000001AFE0000-memory.dmp

    Filesize

    896KB

  • memory/2592-15-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/2592-13-0x000007FFFFFD7000-0x000007FFFFFD8000-memory.dmp

    Filesize

    4KB

  • memory/2592-11-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/2592-9-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/2592-7-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/2592-2220-0x0000000000140000-0x0000000000148000-memory.dmp

    Filesize

    32KB

  • memory/2592-2221-0x0000000000700000-0x0000000000756000-memory.dmp

    Filesize

    344KB

  • memory/2592-2222-0x00000000007E0000-0x0000000000834000-memory.dmp

    Filesize

    336KB

  • memory/2592-2224-0x000007FEF57B0000-0x000007FEF619C000-memory.dmp

    Filesize

    9.9MB